An attacker breaks into a corporate database and deletes critical files. What security goal is this attack focused on? How can detective countermeasures act as preventive countermeasures? A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached. There, they find a list of customers and use the list to their advantage. Have they hacked your webserver? What problem may you encounter in suing them for the theft of trade secrets?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here